Author of the publication

Early prediction for mode anomaly in generative adversarial network training: An empirical study.

, , , , , and . Inf. Sci., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Understanding of Code Clone Detection by ChatGPT., , , , and . DSIT, page 78-83. IEEE, (2023)Callback2Vec: Callback-aware hierarchical embedding for mobile application., , , , and . Inf. Sci., (2021)Sharing runtime permission issues for developers based on similar-app review mining., , , , , , and . J. Syst. Softw., (2022)Bi-Dimensional Representation of Patients for Diagnosis Prediction., , , and . COMPSAC (2), page 374-379. IEEE, (2019)Deep Review Sharing., , , , , , , and . SANER, page 61-72. IEEE, (2019)TRAC: A Therapeutic Regimen-Oriented Access Control Model in Healthcare., , , , , and . COMPSAC (2), page 388-393. IEEE Computer Society, (2018)978-1-5386-2667-2.A Combined Model for Time Series Prediction in Financial Markets., , , , and . APWeb/WAIM (2), volume 10988 of Lecture Notes in Computer Science, page 138-147. Springer, (2018)RSKNet-MTSP: Effective and portable deep architecture for speaker verification., , , , and . Neurocomputing, (2022)Systematic Comprehension for Developer Reply in Mobile System Forum., , , , , , and . SANER, page 242-252. IEEE, (2019)An Effective Penetration Test Approach Based on Feature Matrix for Exposing SQL Injection Vulnerability., , , , , , , and . COMPSAC, page 123-132. IEEE Computer Society, (2016)